Fileless PELoader: POC Breakdown ????
Akash Labade
Ethical Hacker | Threat Analyst | Security Analyst | Cyber Security Researcher | Bug hunter | Offensive + Defensive
In our last blog, we explored the theoretical side of Fileless PELoaders and how they evade traditional defenses. Now, it’s time to get our hands dirty with a Proof of Concept (POC) that demonstrates just how these attacks work in real life. ??
What You’ll Need
For this POC, we’ll be using publicly available tools to replicate the attack scenario. Below are the required files and their purposes:
Steps to Reproduce
1. Setting Up Sliver
2. Compiling the Loader DLL
Use the fileless.cpp from the PELoader GitHub repo to create a loader DLL:
x86_64-w64-mingw32-g++ fileless.cpp -lwinhttp -shared -- static -o payload.dll
3. Encrypting the Shellcode
Generate encrypted shellcode using the aes.py script:
领英推荐
python aes.py [sliver_payload]
4. Hosting the Files
Start an HTTP server to host the files (Payload.dll, cipher.bin, and key.bin):
python -m http.server 8080
5. Executing the Loader
What Happens Next?
Once the shellcode is decrypted and executed in memory, it establishes a reverse shell back to the Sliver C2 server. You can now control the compromised system, demonstrating how attackers leverage fileless techniques to evade detection.
Want to See It in Action? ??
Reference:
?? Disclaimer: This video is created solely for educational purposes and demonstrates a controlled setup within my local lab environment. The content highlights the successful implementation of a reverse shell, showcasing how security mechanisms like Windows Defender can be bypassed in a fully updated Windows environment. The intent of this video is to raise awareness about potential vulnerabilities, helping security professionals and organizations strengthen their defenses against similar techniques.
?Important Notes: The techniques shown are conducted in a strictly isolated and authorized testing environment. I do not condone or encourage any form of unauthorized or malicious use of this information. Misuse of such knowledge for illegal activities is a violation of laws and ethical standards and is punishable under cybersecurity legislation. This content is intended for ethical hackers, penetration testers, and security professionals to understand the importance of robust security measures and to improve detection and response strategies.
Manager Threat Ops @ Sophos | ITIL Foundation, EC-Council Certified Security Analyst, GIAC Certified Forensic Analyst, MBA Data Science | SOC Advisor
3 个月Amazing, very well written mama!